Seychelles Revenue Commission Practice Statement PS CM 2009/02
|
|
- Rosalyn Hubbard
- 7 years ago
- Views:
Transcription
1 Seychelles Revenue Commission Practice Statement This Corporate Management Practice Statement is issued under the authority of the Revenue Commissioner (Commissioner) of the Seychelles Revenue Commission (SRC). Corporate Management Practice Statements are endorsed corporate policy and must be followed by all SRC employees. In circumstances where the anticipated impact of this Practice Statement is likely to result in unintended consequences, matters are to be referred to the Commissioner SRC. SUBJECT: This is a direction for the Proper Use of Information and Communication Technology (ICT) Facilities. PURPOSE: This practice statement describes the conditions under which SRC ICT facilities may be used and directs certain action by authorised ICT facilities users. Noncompliance could amount to a breach of the Code of Conduct. SUMMARY OF MAIN POINTS This practice statement: sets out what constitutes unacceptable use of ICT facilities within the SRC; sets out what constitutes acceptable occasional personal ITC use within the SRC; directs employees and other persons not to engage in unacceptable use of ICT facilities within the SRC; directs employees and other persons to report any perceived misuse of ICT facilities; and sets out how breaches of this Practice Statement will be dealt with.
2 STATEMENT Background 1. ICT facilities are provided by the SRC for the purpose of enabling authorised SRC users to conduct official SRC business. 2. Five key principles govern the provision of SRC ICT facilities: ICT facilities are provided for the conduct of official SRC business; ICT facilities are to be treated as the property of the SRC; any data or material entered onto, stored on or transmitted using ICT facilities is subject to inspection by the SRC and may be removed by the SRC IT section head; the use of ICT facilities must comply with all relevant laws of the Republic of Seychelles, SRC policies and procedures and must uphold the department s Code of Conduct; and ICT facilities users will be held personally accountable for any unauthorised use of ICT facilities. Direction: Authorised use of information and communication technology 3. Authorised SRC users are directed not to make unacceptable use of ICT facilities. Unacceptable uses are detailed in paragraph 13 of this Practice Statement. 4. The SRC will allow occasional personal use of ICT facilities provided that the effect on ICT facilities is negligible. Guidance on occasional personal use is provided in paragraphs 14 to 17 inclusive of this Practice Statement. EXPLANATION Definitions 5. In this practice statement ICT facilities include: all electronic hardware, firmware, software, computers (desktop and laptop), photocopiers, facsimile machines, printers, personal digital assistants, Internet connections, internal and external electronic mail connections, telephones, voice mail and data on any computer or peripheral device or related storage device Page 2 of 11
3 such as floppy disks, CD ROMs and tape cartridges. This list is for illustrative purposes only and does not limit the application of this practice statement; and an item whether owned, leased, managed, or operated by the SRC and includes items supplied by an external service provider for SRC use. 6. In this practice statement authorised ICT facilities users includes: employees of the SRC; employees of another Department or agency who are performing duties on behalf of the SRC (for example, people on secondment to the SRC); employees of other Department or agencies who have access to SRC ICT facilities to perform work on behalf of that department or agency; and persons performing a service under a contract to the SRC. 7. In this practice statement sexually oriented material includes but is not limited to images, text files, data or other material that: is obscene or indecent or whose main focus is pornography, partial nudity, full nudity or sexual acts. 8. In this practice statement offensive material includes but is not limited to images, text files, data or other material that: offends against community standards and includes images, data or other material that is humiliating, vulgar, discriminatory or racially biased against any person or group of persons; or portrays violence towards people, animals or destruction of property. 9. In this practice statement discriminatory material means material, including any images, text files or data, the display of which in the workplace would be unlawful according to any relevant law enacted in the Republic of Seychelles. 10. Advice on discriminatory material and the above mentioned legislation can, in the first instance, be obtained from the Commissioner secretariat. 11. In this practice statement inappropriate material includes but is not limited to images, text files, data or other material that: Page 3 of 11
4 concerns terrorism, espionage, bomb or incendiary device making, theft or illegal drug use or similar material; is defamatory, abusive, or likely to promote hatred or incite violence; is harmful to the national interests of the Republic of Seychelles or its security; or may harass, intimidate, threaten or offend another person. Direction: Unacceptable use of ICT Facilities 12. Authorised ICT facilities users are directed not to make unacceptable use of SRC ICT facilities. 13. Unacceptable use of SRC ICT facilities includes, but is not limited to: any use in breach of any law legislated in the Republic of Seychelles; any use in breach of the SRC Code of Conduct; distributing material that is harmful to the reputation or integrity of the Republic of Seychelles or the SRC; distributing material that conflicts with the interests of the Republic of Seychelles or SRC; breaching intellectual property rights, including copyright on software; interfering with the authorised use of ICT facilities by others, for example, using the user identification and authenticator (for example, a password) of another authorised user or intercepting another person's communications or without permission from that individual; intentionally disrupting the operation of ICT facilities by any means whatsoever; intentionally spreading malicious software (for example, viruses) within ICT facilities; gaining unauthorised access to any text files, data or material entered onto, stored on or transmitted using ICT facilities including changing that data or material in any way; Page 4 of 11
5 using ICT facilities for private commercial and or non-government commercial activities; using ICT facilities for private activities such as on-line gambling, on-line share trading or political activity; creating, intentionally accessing, possessing, soliciting or distributing any discriminatory, offensive, sexually oriented or inappropriate material; distributing chain letters or other bulk that is not authorised or workrelated; distributing anonymously, using a false identity; distributing communications or that disclose personal information of another without proper authorisation; intentionally visiting, or remaining in, Internet sites containing discriminatory, offensive, sexually oriented or inappropriate material; the dissemination of union material unless prior approval has been obtained from the Commissioner; using ICT facilities to conduct business for 'not for profit' organisations or charities unless prior approval has been received from the Commissioner; and installing, storing or disseminating any material including an inappropriate image, video or executable files (such as games) unless prior approval is obtained from the Commissioner. Occasional personal use 14. The SRC recognises that employees will occasionally wish to use ICT facilities for personal purposes. The occasional personal use of ICT facilities is a discretionary privilege granted by the Commissioner, not a condition of service. The Commissioner reserves the right to vary or withdraw this permission from all or any authorised ICT facilities user at any time. 15. In seeking to maintain a balance between the needs of the SRC and employees, the SRC will accept occasional personal use of ICT facilities provided that: it does not constitute an unacceptable use as detailed above; and Page 5 of 11
6 its effect on the SRC is negligible. 16. In determining whether an occasional personal use has a negligible effect on the SRC, the SRC will consider: the time spent in composing, reading and reviewing documents; time spent in browsing the Internet, especially when following up false leads or distracting Internet sites; the use of facsimile and printer resources such as paper, toner and maintenance; the use of other resources (server storage space, network traffic, etc.); the interruption to the flow and pattern of SRC work; occupational health matters related to excessive time spent at computer display screens and keyboards; the effect on the work of colleagues, particularly how colleagues may feel about receiving unsolicited s; the risk of viruses, worms, etc. being transferred onto SRC ICT facilities; and the risk of leaking SRC information by employees visiting Internet sites which may interrogate the browsing workstation. 17. The extent to which the usage intrudes into the employee s ability to fulfil their duties will be a consideration as to whether such usage is reasonable. Advice to other Agency Heads 18. It should be noted that details of inappropriate communications between employees of the SRC and other public service agencies will be provided to other agencies for their considered action under their respective Codes of Conduct. Further Advice on Acceptable and Unacceptable Use 19. Further information and advice on the interpretation of this practice statement can be obtained from the Commissioner s secretariat. Advice should always be sought in cases where there is doubt as to whether a particular use is unacceptable or not. See paragraph 24 of this practice statement for contact details. Page 6 of 11
7 Direction: ICT Responsibilities for SRC employees 20. All authorised ICT facilities users are responsible for the content of messages sent from their account and are directed to: delete all unacceptable material from their account as soon as practical; actively discourage the use and circulation of 'junk' mail (such as advertising material not connected to the business of the SRC) and chain letters; not alter or dismantle equipment without proper authority; maintain security by securing their workstation or laptop from improper use by regularly changing their password, not disclosing their password onto other people, activating secure screen-savers when their computer is not in use for short periods of time (15 minutes or more) and logging off computers at the end of the working day; and notify their supervisor, manager or Director of any perceived misuse of IT facilities. Direction: SRC employees supervising contractors 21. SRC employees responsible for contractors who perform services for the SRC are directed to ensure that: this corporate management practice statement is brought to the attention of the contractor and their employees; contract documentation includes a requirement to follow the terms of this practice statement; and they notify their supervisor, manager or Director of any perceived misuse of ICT facilities by contractors. See paragraph 24 of this practice statement for contact details. Page 7 of 11
8 Direction: SRC Contractors 22. Contractors who perform services for the SRC and who are authorised ICT facilities users are directed to: follow the requirements of this practice statement; meet the expectations for 'All Employees' as outlined above; and notify their SRC contract manager of any perceived misuse of IT facilities. See paragraph 24 of this practice statement for contact details. Supervisors, Managers and Directors 23. SRC supervisors, managers and Directors are directed to ensure: they model the behaviour expected of all SRC employees; that SRC employees for whom they are responsible follow this practice statement; that SRC contractors working in their area are made aware of and follow this practice statement; they immediately follow up on suspected cases of the misuse of ICT facilities; and they notify their superior of any perceived misuse of ICT Services by contractors or employees. See paragraph 24 of this practice statement for contact details. Complaints and Investigation 24. Instances of unacceptable use of SRC IT facilities can be reported to: supervisors, managers or the Commissioner; a member of the SRC IT facilities management; Phone: Page 8 of 11
9 Sanctions for non-compliance 25. A breach of this practice statement may result in criminal prosecution and/or action under the relevant legislation enacted in the Republic of Seychelles. 26. Disciplinary action instituted under these provisions can result in: termination of employment; reduction in classification; re-assignment of duties; reduction in salary; deductions from salary, by way of fine; a reprimand. 27. In considering the appropriate sanction for non-compliance with this practice statement, managers must consult with the Commissioner. Monitoring of ICT facilities Privacy regarding the permitted use of IT facilities 28. Given that IT facilities are SRC property, users with access to IT facilities should expect that private material stored or transmitted (if any) will be subject to scrutiny. 29. Privacy in respect of use of IT facilities is limited: No user should assume that personal or work-related material held on IT facilities is guaranteed to be protected as his or her own private and confidential property. Any data or material created, captured, transmitted or stored using IT facilities may be viewed by authorised personnel as part of the normal monitoring process. Users will not necessarily be notified that an item has been opened and inspected. Page 9 of 11
10 The SRC may remove any unauthorised material without notice and may remove even authorised material but, in that case, will take reasonable steps to give advance notice to users. The SRC may disclose the contents of messages, logs or files stored on IT facilities to appropriate third parties and may use any material where misconduct or criminal action is contemplated. Monitoring and security 30. The SRC runs a range of sophisticated intrusion detection, monitoring and protection tools that log and check IT use, activity and security. For example: addresses - senders and recipients - are logged, along with the transmission time. the content of messages (even deleted items) is stored on mail servers. Monitoring may be undertaken on either a regular or ad-hoc basis by system administrators. Monitoring and/or review of historical holdings may also be undertaken by the Commissioner. web server logs record information on Internet sites visited. the content of files held under an individual user name may be accessed by any Director, IT auditor, the Commissioner or any other person authorised by the Commissioner. filtering systems check incoming material for unacceptable content and block entry of material judged likely to be of an unauthorised nature. 31. While this activity is performed primarily to ensure business continuity and to minimise damage to business by preventing or minimising the effect of security incidents or misuse, these checks will also be used to detect any unauthorised personal use. 32. The SRC reserves the right to access, audit and review IT facilities, at any time. This includes any data or material that has been stored for personal use. 33. SRC IT Section is authorised to: revoke user access to an IT facility; remove any unacceptable material, with or without notice; and Page 10 of 11
11 refer suspected breaches of either the Code of Conduct or a law enacted in the Republic of Seychelles for investigation. 34. Employees will not necessarily be informed prior to these authorised inspections taking place. Breaches 35. Suspected breaches of this policy may be referred to any of the following: The Commissioner; SRC IT Section; Directors. Conformance 36. Conformance with this practice statement will be achieved by relying on reports from the SRC IT facilities management on incidences of breaches of this policy. 37. Further advice, in the first instance, can also be obtained from SRC IT facilities management. See paragraph 24 of this practice statement for contact details. APPROVAL Approved by:.. René Nusse Revenue Commissioner Seychelles Revenue Commission Page 11 of 11
Online Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
More informationEmbedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
More informationInformation Systems Acceptable Use Policy for Learners
Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs
More informationWest Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011
West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer
More informationCOMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
More informationRules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
More informationForrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
More informationPulaski Technical College
Pulaski Technical College Internet and E-Mail Acceptable Use Policy 1. Introduction Pulaski Technical College provides faculty and staff with technology resources and a local area network with access to
More informationPolicy No: 2-B8. Originally Released: 2001. Date for Review: 2016
Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for
More informationHAZELDENE LOWER SCHOOL
HAZELDENE LOWER SCHOOL POLICY AND PROCEDURES FOR MONITORING EQUIPMENT AND APPROPRIATE ICT USE WRITTEN MARCH 2015 SIGNED HEADTEACHER SIGNED CHAIR OF GOVERNORS DATE.. DATE. TO BE REVIEWED SEPTEMBER 2016
More informationAcceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
More information2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
More informationSAS TRUSTEE CORPORATION ( STC )
SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...
More informationSenior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES
Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the
More informationAPPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
More information13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
More informationInformation Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
More informationEMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards
EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data
More informationAcceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
More informationDIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
More informationInternet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
More informationB. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
More informationSOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
More informationAcceptable Use Policy Internet and Email - Students
Acceptable Use Policy Internet and Email - Students Ref HR01 Acceptable Use Policy Internet and Email - Students Review Date: August 2016 North East Scotland College All rights reserved INTRODUCTION Information
More informationEmail & Internet Policy
Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible
More informationPolicy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
More informationThe Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
More informationINTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
More informationInformation Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
More informationFaculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy
Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized
More informationStudents are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
More informationSydney Technical High School
Sydney Technical High School Bring Your Own Device Program: User Charter The Sydney Technical High School s Bring Your Own Device program aims to enhance student learning experiences both in and out of
More informationMARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
More informationConditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
More informationPROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationThe City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationIntroduction. General Use
Introduction Dane County provides a variety of technological resources to its employees to improve public service and maximize efficiency. The purpose of this policy is to advise users regarding the use
More informationRevelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
More informationAcceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
More informationDigital Device LOAN CHARTER
Digital Device LOAN CHARTER for use with 2015 Surface RT Loans Student name Family name Given name Parent/Carer name Family name Given name A Digital Device Loan Charter must be signed and provided to
More informationCity of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
More informationTerms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
More informationHow To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
More informationInstruction. Neoga Community Unit School District #3 Page 1 of 5
Page 1 of 5 Instruction Exhibit - Authorization for Electronic Network Access Each staff member must sign this Authorization as a condition for using the District's Electronic Network connection. Each
More informationHow To Monitor The Internet In Idaho
Idaho Technology Authority (ITA) ENTERPRISE POLICY P1000 GENERAL POLICIES Category: P1050 EMPLOYEE INTERNET USE, MONITORING AND FILTERING CONTENTS: I. Authority II. Abstract III. Definitions IV. Policy
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationComputer Facilities and External Networks Acceptable Use by Students
Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic
More informationPOLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES)
Policy Document POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES) For the definitions of terms used in this policy document refer to the Delegations of
More informationR3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS
R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes
More informationSuperintendent Policy Code: 4185 Page 1 of 7 EMPLOYEE USE OF COMPUTERS, THE INTERNET AND ELECTRONIC COMMUNICATIONS
Page 1 of 7 ELECTRONIC COMMUNICATIONS 1.0 The District supports the use of the Internet and electronic communications by all employees to improve teaching and learning through interpersonal communication,
More informationDelaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
More informationBroadband Acceptable Use Policy
Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2
More informationAcceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
More informationHow To Use A College Computer System Safely
1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.
More informationBring Your Own Device Program: User Charter
Bring Your Own Device Program: User Charter Turramurra High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. The wireless network and
More informationAcceptable Use Policy
1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,
More informationAVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
More informationINTERNET AND EMAIL POLICY
Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy
More informationVICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0
More informationMedina County Policy Manual
Medina County Policy Manual Policy: Computer & Network Usage Section: Work Rules Number: 7.015 Issued: 09/17/07 Reviewed/Revised: Page #: 1 of 5 A. It is the intent of Medina County to provide local, network,
More informationStudent Laptop User Charter
Student name Family name Given name Year Level Parent/Carer name Family name Given name Purpose The St Margaret s Anglican Girls School Laptop Program aims to improve student learning experiences both
More informationICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
More information3. Electronic Mail (E-mail)
- Title of Agency - Internet Acceptable Use Policy The Following Internet Acceptable Use Policy Applies to the (AGENCY NAME) Staff 1. Introduction The (AGENCY NAME) provides its staff and (other entity(s)
More informationINFORMATION TECHNOLOGY APPROPRIATE USE
INFORMATION TECHNOLOGY APPROPRIATE USE POLICY 1000.0100.12 Section 10, Information Systems Responsible College Officer: Executive Director of Information Systems/CIO Originally Issued: April 24, 2008 Original
More informationHUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
More informationUNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
More informationAcceptable Use Policy
Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
More informationRevised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
More informationThe Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
More informationTECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS PURPOSE This policy provides the procedures, rules, guidelines and codes of conduct for the use of the technology and information networks at Socorro Consolidated
More informationINTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
More information2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
More informationICT Acceptable Use Policy. August 2015
ICT Acceptable Use Policy August 2015 Document title ICT Acceptable Use Policy August 2015 Document author and department Responsible person and department Robbie Walker, Information Security Architect,
More information719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)
719.00 INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15) The Stoughton Area School District is committed to the appropriate use of the Internet and
More informationEmail Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
More informationBring Your Own Device Program: 2015 User Agreement
Bring Your Own Device Program: 2015 User Agreement Asquith Girls High School Bring Your Own Device program aims to improve student learning experiences both in and out of the classroom. Asquith Girls High
More information6141.9. Internet and Computers. Acceptable Use and Internet Safety
6141.9 Acceptable Use and Internet Safety The Board of Education provides computers, a computer network, including Internet access and an email system, as well as electronic devices such as cellular telephones
More informationNorth Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
More informationGrand Rapids Public Schools
4510-R Computer Network (Cf. 4520) 4510-R Planning and funding for computer networking in the District shall be handled in accord with the District's policy and rules on technology. Supervised Use Teachers
More informationEMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
More informationINFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
More informationCCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils
CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils Contents 1. Scope 2 2. Use of IT Facilities 2 3. Monitoring of IT Facilities 5 4. Maintenance & Repairs 6 5. Copyright and Licence Agreements
More informationThe term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.
Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together
More informationUSE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
More informationWestwood Baptist Church Computer use Policy
Westwood Baptist Church Computer use Policy I. Policy Statement The use of Westwood Baptist Church automation systems, including computers, fax machines, and all forms of Internet/Intranet access, is for
More informationBBB, EDC, EDC-RA, EGI-RA, EHC-RA, IGS, JFA, JFA-RA, JHF-RA, JOA-RA, KBA-RB, KBB Superintendent of Schools
REGULATION Related Entries: Responsible Office: MONTGOMERY COUNTY PUBLIC SCHOOLS IGT-RA BBB, EDC, EDC-RA, EGI-RA, EHC-RA, IGS, JFA, JFA-RA, JHF-RA, JOA-RA, KBA-RB, KBB Superintendent of Schools User Responsibilities
More informationTECHNOLOGY USAGE POLICY
TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage
More informationTITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY
TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY Council Resolution No 313/03 adopted at the Ordinary Meeting of Council on 19 August 2003. PURPOSE
More informationValmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
More informationDene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
More informationR 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
More informationEMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
More informationregion16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
More informationCOMPUTER, NETWORK AND INTERNET USE POLICY
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
More informationInternet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
More informationInternet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
More informationABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body)
ABERDARE COMMUNITY SCHOOL Email Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) E-MAIL POLICY Review This policy has been approved
More informationDescriptor Code: EFE-P
ADMINISTRATIVE PROCEDURE Descriptor Term: ACCEPTABLE USE OF ELECTRONIC TRANSMISSION CAPABILITIES Descriptor Code: EFE-P Date Issued: October 30, 2003 Date Changed June 26, 2008 September 30, 2009 1. Network
More informationRecommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
More information